[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252271

 
 

909

 
 

196835

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26864 Download | Alert*

The host is installed with Microsoft SQL Server 2012 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle pointer casting. Successful exploitation could allow attackers to gain elevated privileges.

The host is installed with Microsoft SQL Server 2012 on x64 bit systems or 2014 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to spoof content or disclose sensitive information.

The host is installed with Microsoft SQL Server 2008, 2008 R2 or 2012 and is prone to a stack overrun vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to stop responding until a manual reboot is initiated.

The host is installed with Visual Studio and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Apple iCloud before 7.5 or Apple iTunes before 12.7.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly perform state management. Successful exploitation could allow local user to read a persistent device identifier.

The host is installed with Apple iCloud before 7.5 or Apple iTunes before 12.7.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly perform state management. Successful exploitation could allow local user to modify the state of the Keychain.

The host is installed with Apple iCloud before 7.5 or Apple iTunes before 12.7.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly perform state management. Successful exploitation could allow local user to view sensitive user information.

The host is installed with Oracle Fusion Middleware MapViewer 12.2.1.2 or 12.2.1.1 or 11.1.1.9 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the issues in Map Builder component. Successful exploitation allows attackers to affect confidentiality, integrity and availability.

The host is installed with KeePass 1.6.0 before 2.13 and is prone to an untrusted search path vulnerability. A flaw is present in the application which fails to properly handle an issue in the directory that contains a .kdbx file. Successful exploitation allows attackers to gain privileges via a Trojan horse DwmApi.dll file in the current working directory.

The host is installed with KeePass before 1.18 and is prone to an untrusted search path vulnerability. A flaw is present in the application which fails to properly handle an issue in the directory that contains a .kdb file. Successful exploitation allows attackers to gain privileges via a Trojan horse DLL in the current working directory.


Pages:      Start    1798    1799    1800    1801    1802    1803    1804    1805    1806    1807    1808    1809    1810    1811    ..   2686

© SecPod Technologies